US11226812B2 - Managing an update of a software module in a layered filesystem - Google Patents
Managing an update of a software module in a layered filesystem Download PDFInfo
- Publication number
- US11226812B2 US11226812B2 US16/695,296 US201916695296A US11226812B2 US 11226812 B2 US11226812 B2 US 11226812B2 US 201916695296 A US201916695296 A US 201916695296A US 11226812 B2 US11226812 B2 US 11226812B2
- Authority
- US
- United States
- Prior art keywords
- layer
- software module
- stability score
- software
- software modules
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/65—Updates
- G06F8/658—Incremental updates; Differential updates
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/008—Reliability or availability analysis
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/11—File system administration, e.g. details of archiving or snapshots
- G06F16/122—File system administration, e.g. details of archiving or snapshots using management policies
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/61—Installation
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/70—Software maintenance or management
- G06F8/71—Version control; Configuration management
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
- G06F9/45558—Hypervisor-specific management and integration aspects
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
- G06F9/45558—Hypervisor-specific management and integration aspects
- G06F2009/45562—Creating, deleting, cloning virtual machine instances
Definitions
- the present invention relates generally to an updating of a software module in a layered filesystem.
- a given software product may be provided to a user in a software package that is typically built and managed using a software package manager.
- a software package manager (or “software package management system”) is defined as any collection of software tools that automate the process of installing, upgrading, configuring, and removing computer programs for a computer's operating system in a consistent manner.
- a software package manager typically deals with packages, distributions of software and data in archive files.
- Software packages typically include metadata, such as the software's name, description of its purpose, version number, vendor, checksum, and a list of dependencies necessary for the software to run properly. Upon installation, metadata is typically stored in a local package database.
- Software package managers typically maintain a database of software dependencies and version information to prevent software mismatches and missing prerequisites.
- Software package managers typically work closely with software repositories, binary repository managers, and app stores. Software package managers are typically designed to eliminate the need for manual installs and updates, which can be particularly useful for large enterprises whose operating systems are based on Linux and other Unix-like systems, typically consisting of hundreds or even tens of thousands of distinct software packages.
- a software product typically includes a software application that is made up of a relatively large number of “software modules.” Each software module typically defines a given function (or set of functions) that is needed for running the software application on a data processor/computing system. Such a software module is compiled as code defining a set of instructions, which when executed by a data processor/computing system, causes the given function(s) associated with that software module to be performed by a computing device.
- a software module may be provided as a part of a given software library stored in an online repository that is accessible to a user of the software package in which the software module is encapsulated.
- Software modules are changed by their developers relatively regularly in that they may, for example, be updated according to any modified functionality that they define in respect of a given software application and/or to fix any bugs reported in respect of their use.
- relatively large dependency chains of software modules are typically formed and typically accumulate as this further development proceeds over time. This is especially true with high-level, interpreted programming languages that are dynamic, weakly typed, prototype-based and multi-paradigm (such as Javascript and package managers for Javascript).
- a Node.js application In the specific case of a Node.js application to be run on a given data processor/computing system, it is installed and managed with an NPM (sometimes also referred to as “npm”) package manager.
- NPM sometimes also referred to as “npm”
- An npm install command installs the dependency chains of software modules that are required for running the Node.js application on the processor/system. This is done by accessing a package.json file, which describes certain aspects of the Node.js application and also what dependency chains of corresponding software modules need to be installed for running the Node.js application. Apart from the installation and management of the Node.js application, an appropriate environment is required for running it. For example, this is conventionally sometimes done by using Docker container technology, specifically by accessing a given Docker file, which contains instructions on commands to run in order to create an appropriate system for running the Node.js application.
- Docker containerization uses a layered filesystem to install layers including dependency chains of given software modules encapsulated in the Node.js application.
- the layers of a given Docker file are accessed/installed on a line-by-line basis to deploy the Node.js application on a given processor/system.
- the layers are rebuilt and re-installed when an associated change occurs in respect of the software modules required for running the Node.js application, in their corresponding dependency chains. For example, an npm install command would install the entire dependency chain of a layer in the Docker file, even if only a part of that dependency chain was updated/modified in the package.json file.
- a software-implemented method for managing an update of at least one of multiple software modules of a layered filesystem installed for running a software application on a data processor comprising: in response to an installation command being issued at the data processor, accessing a list of software module entries corresponding to software modules to be installed on the data processor; providing a stability scoring, reflecting a likelihood of an update being performed, in respect of each software module in the accessed list; rearranging the entries of the software modules on a basis of a stability ordering, which is derivable from the stability scoring performed in respect of the software modules, thereby yielding a reordered list; generating respective layers for the software modules in the reordered list and installing them on the data processor, and in response to a given software module in the layered filesystem being updated, rebuilding at least some of the layers in the layered filesystem, according to their stability ordering in the reordered list relative to the layer corresponding to the updated software module.
- an embodiment of the method aspect comprises: deriving the stability ordering so that respective entries of the software modules are arranged in the reordered list in an order of progression of an increased likelihood of being updated.
- an embodiment of the method aspect comprises: in response to the given software module in the layered filesystem being updated, contributing any back layer to the layered filesystem comprising a layer that has already been installed on the data processor and which has a software module entry preceding that for the given updated software module in the reordered list.
- an embodiment of the method aspect comprises: in response to the given software module in the layered filesystem being updated, rebuilding any layer corresponding to a software module with an entry subsequent to that for the given updated software module in the reordered list.
- an embodiment of the method aspect comprises: providing stability scoring in respect of any given software module on at least a basis of one of: historical data and analysis of associated metadata.
- an embodiment of the method aspect comprises: providing the software modules as a part of a software package manager deployed in conjunction with given container technology for running a given software application on the data processor.
- a system for managing an update of at least one of multiple software modules of a layered filesystem installed for running a software application on a data processor comprising: a stability calculator that is operably coupled to at least the data processor and that is configurable to: access a list of software module entries corresponding to software modules to be installed on the data processor; provide a stability scoring, reflecting a likelihood of an update being performed, in respect of each software module in the accessed list, and to rearrange the entries of the software modules on a basis of a stability ordering, which is derivable from the stability scoring performed in respect of the software modules, thereby yielding a reordered list; a layer generator that is operably coupled to at least the stability calculator and the data processor and that is configurable to: generate respective layers for the software modules in the reordered list and to install them on the data processor, and a layer manager that is operably coupled to the layer generator, stability calculator and data processor and that is configurable to: facilitate rebuild
- a computer program product for managing an update of at least one of multiple software modules of a layered filesystem installed for running a software application on a data processor
- the computer program product comprising a computer readable storage medium having program instructions embodied therewith, the program instructions being executable by the data processor to cause the processor to facilitate: in response to an installation command being issued at the data processor, accessing of a list of software module entries corresponding to software modules to be installed on the data processor; provision of a stability scoring, reflecting a likelihood of an update being performed, in respect of each software module in the accessed list; rearrangement of the entries of the software modules on a basis of a stability ordering, which is derivable from the stability scoring performed in respect of the software modules, thereby yielding a reordered list; generation of respective layers for the software modules in the reordered list and installing them on the data processor, and in response to a given software module in the layered filesystem being updated, to facilitate rebuilding
- a software-implemented method, computer program product and/or computer system manages an update of at least one of multiple software modules of a layered filesystem installed for running a software application on a data processor, through the following operations (not necessarily in the following order): (i) responsive to an installation command being issued at the data processor, accessing a list of software module entries respectively corresponding to software modules to be installed on the data processor; (ii) for each given software module in the accessed list of software module entries: (a) providing a respectively corresponding stability score value, with the stability score value indicating a probability of an update being performed at a future time on the given software module, (b) generating a respectively corresponding set of layer(s), and (c) installing the respectively corresponding set of layer(s) on the data processor; (iii) creating a layered filesystem based on the installed sets of layer(s); (iv) determining a stability order for the entries in the list of software module entries, with the stability order corresponding to the
- a software-implemented method, computer program product and/or computer system manages an update of at least one of multiple software modules of a layered filesystem installed for running a software application on a data processor, through the following operations (not necessarily in the following order): (i) responsive to an installation command being issued at the data processor, accessing a list of software module entries respectively corresponding to software modules to be installed on the data processor; (ii) for each given software module in the accessed list of software module entries: (a) providing a respectively corresponding stability score value, with the stability score value indicating a probability of an update being performed at a future time on the given software module, (b) generating a respectively corresponding set of layer(s), and (c) installing the respectively corresponding set of layer(s) on the data processor; (iii) creating a layered filesystem based on the installed sets of layer(s); (iv) determining a stability order for the entries in the list of software module entries, with the stability order corresponding
- a method, computer program product and/or system that performs the following operations (not necessarily in the following order): (i) generating, by a file system layer generator, a first layered file system, with the first layered file system including a plurality of software modules and a first layer; (ii) for each given software module of the plurality of software modules, calculating, by a stability score module, a stability score value, with the stability score value being indicative of a likelihood that the given software module needs to be updated; (iii) creating, by a file system layer managing module, a first ordered list of software modules based upon the stability score values of each of the software modules of the plurality of software modules; (iv) determining that a first sub-set of the software modules need to be updated; and (v) responsive to the determination that the first sub-set of the software modules need to be updated, updating the first sub-set of the software modules, with each software modules of the sub-set of software modules having a high stability score value.
- FIG. 1 schematically illustrates a general framework of an embodiment of a system aspect of the present invention
- FIG. 2 shows a flowchart of an embodiment of a method aspect of the present invention.
- FIG. 3 shows a block diagram of a networked computers computing environment in which various embodiments of the present invention may operate.
- Some embodiments of the present invention are directed to managing an update of software modules of a layered filesystem installed for running a software application on a data processor.
- the management of an updated module may include: (i) contributing a back layer from a software module that likely has less stability than the updated module; and/or (ii) rebuilding a layer using a software module that likely has more stability than the updated layer.
- This Detailed Description section is divided into the following sub-sections: (i) The Hardware and Software Environment; (ii) Explanations And Embodiment(s); and (iii) Definitions.
- FIG. 3 is a functional block diagram illustrating various portions of networked computers system 400 , including: server sub-system 102 ; client sub-systems 104 , 106 , 108 , 110 , 112 ; communication network 114 ; server computer 200 ; communication unit 202 ; processor set 204 ; input/output (I/O) interface set 206 ; memory device 208 ; persistent storage device 210 ; display device 212 ; external device set 214 ; random access memory (RAM) devices 230 ; cache memory device 232 ; and program 300 .
- server sub-system 102 client sub-systems 104 , 106 , 108 , 110 , 112 ; communication network 114 ; server computer 200 ; communication unit 202 ; processor set 204 ; input/output (I/O) interface set 206 ; memory device 208 ; persistent storage device 210 ; display device 212 ; external device set 214 ; random access memory (RAM) devices 230 ; cache memory device
- Sub-system 102 is, in many respects, representative of the various computer sub-system(s) in the present invention. Accordingly, several portions of sub-system 102 will now be discussed in the following paragraphs.
- Sub-system 102 may be a laptop computer, tablet computer, netbook computer, personal computer (PC), a desktop computer, a personal digital assistant (PDA), a smart phone, or any programmable electronic device capable of communicating with the client sub-systems via network 114 .
- Program 300 is a collection of machine readable instructions and/or data that is used to create, manage and control certain software functions that will be discussed in detail, below, in the Example Embodiment sub-section of this Detailed Description section.
- Sub-system 102 is capable of communicating with other computer sub-systems via network 114 .
- Network 114 can be, for example, a local area network (LAN), a wide area network (WAN) such as the Internet, or a combination of the two, and can include wired, wireless, or fiber optic connections.
- LAN local area network
- WAN wide area network
- network 114 can be any combination of connections and protocols that will support communications between server and client sub-systems.
- Sub-system 102 is shown as a block diagram with many double arrows. These double arrows (no separate reference numerals) represent a communications fabric, which provides communications between various components of sub-system 102 .
- This communications fabric can be implemented with any architecture designed for passing data and/or control information between processors (such as microprocessors, communications and network processors, etc.), system memory, peripheral devices, and any other hardware components within a system.
- processors such as microprocessors, communications and network processors, etc.
- the communications fabric can be implemented, at least in part, with one or more buses.
- Memory 208 and persistent storage 210 are computer-readable storage media.
- memory 208 can include any suitable volatile or non-volatile computer-readable storage media. It is further noted that, now and/or in the near future: (i) external device(s) 214 may be able to supply, some or all, memory for sub-system 102 ; and/or (ii) devices external to sub-system 102 may be able to provide memory for sub-system 102 .
- Program 300 is stored in persistent storage 210 for access and/or execution by one or more of the respective computer processors 204 , usually through one or more memories of memory 208 .
- Persistent storage 210 (i) is at least more persistent than a signal in transit; (ii) stores the program (including its soft logic and/or data), on a tangible medium (such as magnetic or optical domains); and (iii) is substantially less persistent than permanent storage.
- data storage may be more persistent and/or permanent than the type of storage provided by persistent storage 210 .
- Program 300 may include both machine readable and performable instructions and/or substantive data (that is, the type of data stored in a database).
- persistent storage 210 includes a magnetic hard disk drive.
- persistent storage 210 may include a solid state hard drive, a semiconductor storage device, read-only memory (ROM), erasable programmable read-only memory (EPROM), flash memory, or any other computer-readable storage media that is capable of storing program instructions or digital information.
- the media used by persistent storage 210 may also be removable.
- a removable hard drive may be used for persistent storage 210 .
- Other examples include optical and magnetic disks, thumb drives, and smart cards that are inserted into a drive for transfer onto another computer-readable storage medium that is also part of persistent storage 210 .
- Communications unit 202 in these examples, provides for communications with other data processing systems or devices external to sub-system 102 .
- communications unit 202 includes one or more network interface cards.
- Communications unit 202 may provide communications through the use of either or both physical and wireless communications links. Any software modules discussed herein may be downloaded to a persistent storage device (such as persistent storage device 210 ) through a communications unit (such as communications unit 202 ).
- I/O interface set 206 allows for input and output of data with other devices that may be connected locally in data communication with server computer 200 .
- I/O interface set 206 provides a connection to external device set 214 .
- External device set 214 will typically include devices such as a keyboard, keypad, a touch screen, and/or some other suitable input device.
- External device set 214 can also include portable computer-readable storage media such as, for example, thumb drives, portable optical or magnetic disks, and memory cards.
- Software and data used to practice embodiments of the present invention, for example, program 300 can be stored on such portable computer-readable storage media. In these embodiments the relevant software may (or may not) be loaded, in whole or in part, onto persistent storage device 210 via I/O interface set 206 .
- I/O interface set 206 also connects in data communication with display device 212 .
- Display device 212 provides a mechanism to display data to a user and may be, for example, a computer monitor or a smart phone display screen.
- Some embodiments of the present invention recognize the following facts, potential problems and/or potential areas for improvement with respect to the current state of the art: (i) it is time and resource consuming to install the entire dependency chain every time an update is performed on a part thereof; (ii) it may prove challenging to mitigate some of the drawbacks associated with resource consumption in container technologies; and/or (iii) it may be especially difficult to mitigate the foregoing drawback(s) in a context of any build steps that are performed in response to an update of any part of a given dependency chain.
- FIG. 1 schematically illustrates an embodiment of a system aspect 100 of the present invention implemented for managing an update of at least one of multiple software modules of a layered filesystem, installed for running a software application on a data processor.
- an embodiment of the system aspect 100 of the present invention comprises first and second configurational aspects 10 , 20 .
- the first configurational aspect 10 comprises: a memory 11 that is configurable to store at least an executable instruction, a data processor 12 that is operatively coupled to the memory 11 and configurable to execute any instruction that is received at the data processor 12 and/or stored in the memory 11 .
- Executable instructions may be provided to the data processor 12 via input interface 13 and/or by the running of a software program product according to an embodiment of the present invention.
- An output interface 14 is also provided to facilitate display of any virtual item generated by running a given executable instruction received at the data processor 12 .
- a database 15 is provided for storing any data generated from executing an instruction at the data processor 12 .
- a communications channel 16 is also provided to facilitate communication with other externally provided devices. It may comprise a communication medium that may, for example, generally be wireless or wired media.
- the second configurational aspect 20 is implemented by the provision of at least a stability calculator 21 , a layer manager 22 and a layer generator 23 , which are operatively coupled to each other.
- Operative coupling within and between the first and second configurational aspects 10 , 20 may be performed discernibly and may be facilitated by respectively provided buses 10 ′, 20 ′. Such operative coupling is not limited to the use of buses 10 ′, 20 ′ and may be performed in any other appropriate way within the scope of an embodiment of the present invention.
- FIG. 2 it starts at block 30 .
- a list of the software module entries corresponding to the software modules installed on the data processor 12 is accessed at block 32 . This is done by the stability calculator 21 , which forms a part of the configurational aspect 20 in FIG. 1 .
- the accessed list is processed by the stability calculator 21 , by the provision of a stability scoring, reflecting a likelihood of an update being performed, in respect of each software module entry.
- the stability scoring provided in respect of any given software module may be based on at least one of historical data and analysis of associated metadata in an embodiment of the present invention.
- a stability ordering is derived by the stability calculator 21 from the stability scoring that was performed at block 33 .
- the stability ordering derived at block 33 ′ is used, by the stability calculator 21 , to rearrange the entries of the software modules into a reordered list.
- the stability calculator 21 is operable to transmit the reordered list to the layer generator 23 , which forms a part of the configurational aspect 20 in FIG. 1 .
- the stability ordering that is derived at block 33 ′ by the stability calculator 21 , for use in compiling the reordered list at block 34 is such that respective entries of the software modules are arranged in an order of progression of an increased likelihood of being updated in the reordered list. So, an entry at the beginning of the reordered list would be for a software module that is never or very rarely updated, and the last entry would be for a software module that is updated the most out of all the listed software modules.
- the layer generator 23 is operable to generate respective layers for the software modules in the reordered list that was compiled at block 34 , and to communicate them to the data processor 12 where they are accordingly installed.
- given actions are performed by the layer manager 22 , one of which is shown at block 37 ′ comprising: contributing any back layer to the layered filesystem comprising a layer that has already been installed on the data processor 12 and which has a software module entry preceding that for the given updated software module in the reordered list. So, those cached layers of the layered filesystem installed on the data processor 12 , which correspond to software modules that are updated rarely, or with reduced frequency compared to the updated software module, are reused when incorporating a layer comprising the updated software module in the layered filesystem. In this way, reduced administrative and/or processing resources may be used for the incorporation of the updated version of the software module on the data processor 12 . Also, an overall build time in terms of installing the layered filesystem comprising the updated software module may be reduced.
- Another action that is performed by the layer manager 22 is shown at block 37 ′′ comprising: rebuilding any layer of the layered filesystem on the data processor 12 , which corresponds to a software module with an entry subsequent to that for the given updated software module in the reordered list.
- the layer manager 22 is operable to perform the layer rebuilding of block 37 ′′ after contributing any back layers according to block 37 ′ in order to reconstruct the layered filesystem incorporating any software module with an updated version.
- the reordered list and/or stability ordering is communicated to the layer manager 22 by the stability calculator 21 , or they are derivable by the layer manager 22 from the layer generator 23 .
- Block 38 marks the end of an embodiment of the method aspect 200 of the present invention or a loop is performed back to block 31 over a specifiable period of time in order to address any further software module updates.
- the software modules are provided as a part of a software package manager deployed in conjunction with given container technology, for example, Docker containerization, for running a given software application on a data processor 12 .
- container technology for example, Docker containerization
- Docker containerization for running a given software application on a data processor 12 .
- package.json is added to an image in a first layer, and an install is performed contributing to a second layer.
- the application code is added in as a third layer. If only the application code is modified, then layers 1 and 2 would not have to be rebuilt/re-pulled. If package.json is modified, then the whole npm install layer is rebuilt, that is, all the packages would need to be pulled back.
- An embodiment of the present invention may be applied to this example as in the following steps:
- Container is built
- the npm install in the RUN step identifies running in Docker by the existence of env_var, for example, and installs each dependency/software module in turn and creates a layer for each, which corresponds to blocks 30 to 35 in an embodiment of the method aspect 200 of the present invention as shown in FIG. 2 ;
- npm contributes the layers created in step 2 back up to Docker individually, which corresponds to the installation referenced in block 35 shown in FIG. 2 ;
- Container is rebuilt as a modification/update is performed in respect of a given layer, which corresponds to block 36 in FIG. 2 ;
- Cached layers corresponding to dependencies/software modules that are rarely/infrequently changed are installed before the updated dependency/software module, according to block 37 ′ in FIG. 2 , and all layers of dependencies that are frequently updated are rebuilt after the installation of the updated dependency/software module, this being done according to block 37 ′′ in FIG. 2 .
- the npm command may optimize the respective layers created in respect of each of the dependencies/software modules such that those that rarely change and/or rarely need to change are contributed up first in the build step subsequent to an update in respect of the package.json file.
- the stability scoring done at block 33 and/or stability ordering done at block 33 ′ in FIG. 2 may done by analysis of metadata associated with the package.json file to order, for example, exact updates (2.8.9), minor updates pulled ( ⁇ 2.8.x), major updates pulled ( ⁇ 2.x.x) or version updates pulled (x).
- Metadata retrieved from an associated remote package management site that is, a remote location where the packages and/or modules that are referenced in package.json are stored and downloaded from, may be used as input to the stability ordering/stability scoring according to an embodiment of the present invention.
- the number of commits and/or update history may also be used, however, an embodiment of the present invention is not limited thereto and, indeed, any other appropriate historical data may be used.
- An embodiment of the present invention may be implemented in conjunction with any virtualization and/or containerization technology implementing a layered approach.
- a layered filesystem technology is typically a filesystem that is built up by layers (for example, filesystems employed by Docker containers are considered a type of layered filesystem).
- layers for example, filesystems employed by Docker containers are considered a type of layered filesystem.
- Each added layer of the layered filesystem provides a “delta” on top of the preceding layer. Take, for example, the following Docker file:
- the first layer when building the Docker image is “node:8.”
- This “node:8” is the base image that is used to build on top of and includes Linux and pre-requisites for Node.js.
- the “RUN mkdir/app” contributes a layer on top of this “node:8” base (which is the “delta” that this command causes on the filesystem—in this case a new directory “/app”).
- the “COPY package.json/app/package.json” contributes another layer on top, which is the package.json file.
- the “RUN cd/app && npm install” command contributes yet another layer to the layered filesystem and is the result of installing all of the required packages for this Node.js application. This analysis continues for each given operation of the Docker file above.
- the present invention may be a system, a method and/or a computer program product at any possible technical level of integration
- the computer program product may include a computer readable storage medium (or media) having computer readable program instructions thereon for causing a processor to carry out the aspects of the present invention
- the computer readable storage medium can be a tangible device that can retain and store instructions for use by an instruction execution device.
- the computer readable storage medium may be, for example, but is not limited to, an electronic storage device, a magnetic storage device, an optical storage device, an electromagnetic storage device, a semiconductor storage device, or any suitable combination of the foregoing.
- a non-exhaustive list of more specific examples of the computer readable storage medium includes the following: a portable computer diskette, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), a static random access memory (SRAM), a portable compact disc read-only memory (CD-ROM), a digital versatile disk (DVD), a memory stick, a floppy disk, a mechanically encoded device such as punch-cards or raised structures in a groove having instructions recorded thereon, and any suitable combination of the foregoing.
- RAM random access memory
- ROM read-only memory
- EPROM or Flash memory erasable programmable read-only memory
- SRAM static random access memory
- CD-ROM compact disc read-only memory
- DVD digital versatile disk
- memory stick a floppy disk
- a mechanically encoded device such as punch-cards or raised structures in a groove having instructions recorded thereon
- a computer readable storage medium is not to be construed as being transitory signals per se, such as radio waves or other freely propagating electromagnetic waves, electromagnetic waves propagating through a waveguide or other transmission media (e.g. light pulses passing through a fiber-optic cable), or electrical signals transmitted through a wire.
- Computer readable program instructions described herein can be downloaded to respective computing/processing devices from a computer readable storage medium or to an external computer or external storage device via a network, for example, the Internet, a local area network, a wide area network and/or a wireless network.
- the network may comprise copper transmission cables, optical transmission fibers, wireless transmission, routers, firewalls, switches, gateway computers and/or edge servers.
- a network adapter card or network interface in each computing/processing device receives computer readable program instructions from the network and forwards the computer readable storage instructions for storage in a computer readable storage medium within the respective computing/processing device.
- Computer readable program instructions for carrying out operations of the present invention may be assembler instructions, instruction-set-architecture (ISA) instructions, machine instructions, machine dependent instructions, microcode, firmware instructions, state-setting data, configuration data for integrated circuitry, or either source code or object code written in any combination of one or more programming languages including an object oriented program language such as Smalltalk, C++, or the like, and procedural programming languages, such as the “C” programming language or similar programming languages.
- the computer readable program instructions may execute entirely on the user's computer, partly on the user's computer, as a standalone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server.
- the remote computer may be connected to the user's computer through any type of network, including a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider).
- electronic circuitry including, for example, programmable logic circuitry, field programmable gate arrays (FPGA), or programmable logic arrays (PLA) may execute the computer readable program instructions by utilizing state information of the computer readable program instructions to personalize the electronic circuitry, in order to perform aspects of the present invention.
- These computer readable program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the function/acts specified in the flowchart and/or block diagram block or blocks.
- These computer readable program instructions may also be stored in a computer readable storage medium that can direct a computer, a programmable data processing apparatus, and/or other devices to function in a particular manner, such that the computer readable storage medium having instructions stored therein comprises an article of manufacture including instructions which implement aspects of the function/act specified in the flowchart and/or block diagram block or blocks.
- the computer readable program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other device to cause a series of operational steps to be performed on the computer, other programmable apparatus or other device to produce a computer implemented process, such that the instructions which execute on the computer, other programmable apparatus, or other device implement the functions/acts specified in the flowchart and/or block diagram block or blocks.
- each block in the flowchart or block diagrams may represent a module, segment, or portion of instructions, which comprises one or more executable instructions for implementing the specified logical function(s).
- the functions noted in the blocks may occur out of the order noted in the Figures.
- two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved.
- the various features may be implemented in hardware or as software modules running on one or more data processors.
- Present invention should not be taken as an absolute indication that the subject matter described by the term “present invention” is covered by either the claims as they are filed, or by the claims that may eventually issue after patent prosecution; while the term “present invention” is used to help the reader to get a general feel for which disclosures herein are believed to potentially be new, this understanding, as indicated by use of the term “present invention,” is tentative and provisional and subject to change over the course of patent prosecution as relevant information is developed and as the claims are potentially amended.
- Embodiment see definition of “present invention” above—similar cautions apply to the term “embodiment.”
- Computer any device with significant data processing and/or machine readable instruction reading capabilities including, but not limited to: desktop computers, mainframe computers, laptop computers, field-programmable gate array (FPGA) based devices, smart phones, personal digital assistants (PDAs), body-mounted or inserted computers, embedded device style computers, application-specific integrated circuit (ASIC) based devices.
- FPGA field-programmable gate array
- PDA personal digital assistants
- ASIC application-specific integrated circuit
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Quality & Reliability (AREA)
- Data Mining & Analysis (AREA)
- Databases & Information Systems (AREA)
- Stored Programmes (AREA)
Abstract
Description
| ADD package.json /opt/app/package.json | ||
| RUN cd/opt/app && npm install | ||
| ADD app/opt/app | ||
| . . . | ||
| CMD [“npm”, “start”] | ||
| FROM node:8 | ||
| RUN mkdir /app | ||
| COPY package.json /app/package.json | ||
| RUN cd /app && npm install | ||
| COPY . /app | ||
| WORKDIR /app | ||
| CMD [ “node”, “server.js”] | ||
Claims (15)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US16/695,296 US11226812B2 (en) | 2018-10-23 | 2019-11-26 | Managing an update of a software module in a layered filesystem |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US16/167,581 US10558455B1 (en) | 2018-10-23 | 2018-10-23 | Managing an update of a software module in a layered filesystem |
| US16/695,296 US11226812B2 (en) | 2018-10-23 | 2019-11-26 | Managing an update of a software module in a layered filesystem |
Related Parent Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US16/167,581 Continuation US10558455B1 (en) | 2018-10-23 | 2018-10-23 | Managing an update of a software module in a layered filesystem |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| US20200125358A1 US20200125358A1 (en) | 2020-04-23 |
| US11226812B2 true US11226812B2 (en) | 2022-01-18 |
Family
ID=69410785
Family Applications (2)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US16/167,581 Expired - Fee Related US10558455B1 (en) | 2018-10-23 | 2018-10-23 | Managing an update of a software module in a layered filesystem |
| US16/695,296 Active US11226812B2 (en) | 2018-10-23 | 2019-11-26 | Managing an update of a software module in a layered filesystem |
Family Applications Before (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US16/167,581 Expired - Fee Related US10558455B1 (en) | 2018-10-23 | 2018-10-23 | Managing an update of a software module in a layered filesystem |
Country Status (1)
| Country | Link |
|---|---|
| US (2) | US10558455B1 (en) |
Families Citing this family (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US11294665B1 (en) | 2014-04-23 | 2022-04-05 | William Knight Foster | Computerized software version control with a software database and a human database |
| US9535664B1 (en) * | 2014-04-23 | 2017-01-03 | William Knight Foster | Computerized software development process and management environment |
| US11372654B1 (en) * | 2019-03-25 | 2022-06-28 | Amazon Technologies, Inc. | Remote filesystem permissions management for on-demand code execution |
| WO2021167507A1 (en) * | 2020-02-21 | 2021-08-26 | Telefonaktiebolaget Lm Ericsson (Publ) | Method for updating applications in cloud environments |
| CN113778549B (en) * | 2021-08-16 | 2023-12-22 | 济南浪潮数据技术有限公司 | Method, device, equipment and medium for realizing back-end environment variable replacement |
| US12379997B2 (en) | 2023-07-10 | 2025-08-05 | Red Hat, Inc. | Detecting an error in an updated software package by automatically rebuilding related downstream products |
Citations (24)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20060048129A1 (en) * | 2004-08-31 | 2006-03-02 | Microsoft Corporation | Patch un-installation |
| US20060265588A1 (en) | 2005-05-17 | 2006-11-23 | Samsung Electronics Co., Ltd. | Apparatus and method for displaying file location information |
| US20080133616A1 (en) * | 2006-11-30 | 2008-06-05 | Philip Graham Willoughby | Method, Apparatus and Computer Program Product for Change Management in a Data Processing Environment |
| US7822758B1 (en) | 2005-04-22 | 2010-10-26 | Network Appliance, Inc. | Method and apparatus for restoring a data set |
| US20100281035A1 (en) * | 2009-04-30 | 2010-11-04 | David Carmel | Method and System of Prioritising Operations On Network Objects |
| US20100281083A1 (en) * | 2009-05-04 | 2010-11-04 | Moka5, Inc. | Policy-based layered filesystem management |
| US20110040812A1 (en) | 2007-12-20 | 2011-02-17 | Virtual Computer, Inc. | Layered Virtual File System |
| US20110061046A1 (en) | 2008-12-18 | 2011-03-10 | Virtual Computer, Inc. | Installing Software Applications in a Layered Virtual Workspace |
| US7945897B1 (en) * | 2002-06-12 | 2011-05-17 | Symantec Corporation | Method and system for running an application in a clean operating environment using a layered computing system |
| US20110313973A1 (en) | 2010-06-19 | 2011-12-22 | Srivas Mandayam C | Map-Reduce Ready Distributed File System |
| US8843903B1 (en) * | 2003-06-11 | 2014-09-23 | Symantec Corporation | Process tracking application layered system |
| US20140324804A1 (en) | 2013-04-24 | 2014-10-30 | Empire Technology Development Llc | Computing devices with mult-layer file systems |
| US20150363195A1 (en) | 2014-06-16 | 2015-12-17 | npm, Inc. | Software package management |
| US20170052771A1 (en) | 2015-08-18 | 2017-02-23 | International Business Machines Corporation | Dependency-based container deployment |
| US20170083541A1 (en) * | 2015-09-23 | 2017-03-23 | International Business Machines Corporation | Container Storage Migration |
| US20170118137A1 (en) * | 2015-10-23 | 2017-04-27 | Oracle International Corporation | System and method for multitenant execution of os programs invoked from a multitenant middleware application |
| US20170264684A1 (en) | 2016-03-10 | 2017-09-14 | Vmware, Inc. | Container runtime image management across the cloud |
| US20170262392A1 (en) * | 2016-03-14 | 2017-09-14 | Fujitsu Limited | Image processing apparatus, notification monitoring program, and notification monitoring method |
| US20180088926A1 (en) * | 2016-09-27 | 2018-03-29 | Ca, Inc. | Container image management using layer deltas |
| US20180189122A1 (en) | 2017-01-05 | 2018-07-05 | Portworx, Inc. | Application aware graph driver |
| US20180307480A1 (en) * | 2017-04-25 | 2018-10-25 | Microsoft Technology Licensing, Llc | Updating a code file |
| US20190266259A1 (en) * | 2018-02-23 | 2019-08-29 | Red Hat, Inc. | Managing container-image layers |
| US20200097662A1 (en) * | 2018-09-25 | 2020-03-26 | Ca, Inc. | Combined threat score for container images |
| US10642690B1 (en) * | 2016-12-20 | 2020-05-05 | Tintri By Ddn, Inc. | Policy-driven raid rebuild |
-
2018
- 2018-10-23 US US16/167,581 patent/US10558455B1/en not_active Expired - Fee Related
-
2019
- 2019-11-26 US US16/695,296 patent/US11226812B2/en active Active
Patent Citations (25)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7945897B1 (en) * | 2002-06-12 | 2011-05-17 | Symantec Corporation | Method and system for running an application in a clean operating environment using a layered computing system |
| US8843903B1 (en) * | 2003-06-11 | 2014-09-23 | Symantec Corporation | Process tracking application layered system |
| US20060048129A1 (en) * | 2004-08-31 | 2006-03-02 | Microsoft Corporation | Patch un-installation |
| US7822758B1 (en) | 2005-04-22 | 2010-10-26 | Network Appliance, Inc. | Method and apparatus for restoring a data set |
| US20060265588A1 (en) | 2005-05-17 | 2006-11-23 | Samsung Electronics Co., Ltd. | Apparatus and method for displaying file location information |
| US20080133616A1 (en) * | 2006-11-30 | 2008-06-05 | Philip Graham Willoughby | Method, Apparatus and Computer Program Product for Change Management in a Data Processing Environment |
| US20110040812A1 (en) | 2007-12-20 | 2011-02-17 | Virtual Computer, Inc. | Layered Virtual File System |
| US20110061045A1 (en) | 2007-12-20 | 2011-03-10 | Virtual Computer, Inc. | Operating Systems in a Layerd Virtual Workspace |
| US20110061046A1 (en) | 2008-12-18 | 2011-03-10 | Virtual Computer, Inc. | Installing Software Applications in a Layered Virtual Workspace |
| US20100281035A1 (en) * | 2009-04-30 | 2010-11-04 | David Carmel | Method and System of Prioritising Operations On Network Objects |
| US20100281083A1 (en) * | 2009-05-04 | 2010-11-04 | Moka5, Inc. | Policy-based layered filesystem management |
| US20110313973A1 (en) | 2010-06-19 | 2011-12-22 | Srivas Mandayam C | Map-Reduce Ready Distributed File System |
| US20140324804A1 (en) | 2013-04-24 | 2014-10-30 | Empire Technology Development Llc | Computing devices with mult-layer file systems |
| US20150363195A1 (en) | 2014-06-16 | 2015-12-17 | npm, Inc. | Software package management |
| US20170052771A1 (en) | 2015-08-18 | 2017-02-23 | International Business Machines Corporation | Dependency-based container deployment |
| US20170083541A1 (en) * | 2015-09-23 | 2017-03-23 | International Business Machines Corporation | Container Storage Migration |
| US20170118137A1 (en) * | 2015-10-23 | 2017-04-27 | Oracle International Corporation | System and method for multitenant execution of os programs invoked from a multitenant middleware application |
| US20170264684A1 (en) | 2016-03-10 | 2017-09-14 | Vmware, Inc. | Container runtime image management across the cloud |
| US20170262392A1 (en) * | 2016-03-14 | 2017-09-14 | Fujitsu Limited | Image processing apparatus, notification monitoring program, and notification monitoring method |
| US20180088926A1 (en) * | 2016-09-27 | 2018-03-29 | Ca, Inc. | Container image management using layer deltas |
| US10642690B1 (en) * | 2016-12-20 | 2020-05-05 | Tintri By Ddn, Inc. | Policy-driven raid rebuild |
| US20180189122A1 (en) | 2017-01-05 | 2018-07-05 | Portworx, Inc. | Application aware graph driver |
| US20180307480A1 (en) * | 2017-04-25 | 2018-10-25 | Microsoft Technology Licensing, Llc | Updating a code file |
| US20190266259A1 (en) * | 2018-02-23 | 2019-08-29 | Red Hat, Inc. | Managing container-image layers |
| US20200097662A1 (en) * | 2018-09-25 | 2020-03-26 | Ca, Inc. | Combined threat score for container images |
Non-Patent Citations (8)
| Title |
|---|
| "Docket layer optimisation for Nose.js microservices", GitHub—eoinsha/node-seneca-base, latest comment on Oct. 12, 2017, downloaded from the Internet on Aug. 22, 2018, 2 pages, <https://github.com/eoinsha/node-seneca-base>. |
| "npm-dedupe", Reduce duplication, <https://docs.npmjs.com/cli/dedupe>, downloaded from the Internet on Aug. 22, 2018, 2 pages. |
| "npm-shrinkwrap", Lock down dependency versions for publicaiton, 1 page, downloaded from the Internet on Aug. 22, 2018, <https://docs.npmjs.com/cli/shrinkwrap>. |
| "Providing context to container technology build steps", Authors et. al.: Disclosed Anonymously, IP.com No. IPCOM000252896D, IP.com Electronic Publication Date: Feb. 20, 2018, 4 pages. |
| "Speeding up ‘npm install’ in docker #8836", GitHub, olalonde opened this issue on Jul. 6, 2015, 13 pages, <https://github.com/npm/npm/issues/8836>. |
| IBM Appendix P, list of patents and patent applications treated as related, Filed Herewith, 2 pages. |
| Ross et al., "Managing an Update of a Software Module in a Layered Filesystem", U.S. Appl. No. 16/167,581, IBM Docket No. GB920160755US01, filed Oct. 23, 2018, 33 pages. |
| Weinstein, David, "Building Efficient Dockerfiles—Node.js", bitJudo, Mar. 13, 2014, 10 pages, <http://bitjudo.com/blog/2014/03/13/building-efficient-dockerfiles-node-dot-js/>. |
Also Published As
| Publication number | Publication date |
|---|---|
| US20200125358A1 (en) | 2020-04-23 |
| US10558455B1 (en) | 2020-02-11 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11226812B2 (en) | Managing an update of a software module in a layered filesystem | |
| US11288055B2 (en) | Model-based differencing to selectively generate and deploy images in a target computing environment | |
| US10379841B2 (en) | Facilitating automatic container updating within a container-based environment | |
| US9851993B2 (en) | Virtual machine template optimization | |
| US10877846B2 (en) | Performing a closure merge operation | |
| US9361092B1 (en) | Recommending upgrade actions during migration | |
| US10684844B2 (en) | Making and using functional exploitation information in performing software or firmware updates | |
| US11656864B2 (en) | Automatic application of software updates to container images based on dependencies | |
| US9690564B2 (en) | Runtime detection of software configurations and upgrades | |
| US9811332B2 (en) | Deploying incremental scripts | |
| US9898258B2 (en) | Versioning of build environment information | |
| US11748153B2 (en) | Anticipated containerized infrastructure used in performing cloud migration | |
| US12001837B2 (en) | Two-way synchronization of infrastructure-as-code templates and instances | |
| WO2023179217A1 (en) | Reducing downtime caused by incompatability issues from upgrading firmware and software | |
| US20240104516A1 (en) | Remanufacturing orientated operations | |
| US20150378784A1 (en) | Work flow level job input/output | |
| US10782959B1 (en) | Storing a file list for a public file repository as a file to avoid rate limits on file list requests | |
| US20230315867A1 (en) | Lifecycle management of secrets in a cloud microservices architecture | |
| US20230055088A1 (en) | Application modernization | |
| US10747566B2 (en) | Restarting application servers | |
| US10284648B2 (en) | Application multi-versioning in a traditional language environment | |
| Scott | Introducing Docker and oracle | |
| US9910645B2 (en) | Incremental build generation | |
| US11809376B2 (en) | Building a file system for multiple architectures | |
| US20150220310A1 (en) | Object field optimization |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| AS | Assignment |
Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW YORK Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:ROSS, MARTIN A.;ROGERS, SAM;REEL/FRAME:051113/0574 Effective date: 20181011 |
|
| FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: AWAITING TC RESP, ISSUE FEE PAYMENT RECEIVED |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: AWAITING TC RESP, ISSUE FEE PAYMENT VERIFIED |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED |
|
| STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
| FEPP | Fee payment procedure |
Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |